Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe
-
Size
184KB
-
MD5
f1167f1220c3db301e4eca1a16fe4452
-
SHA1
40e945312c1e1afea8ba05e188f16ef8282ff08d
-
SHA256
34a90837f468ad148e0bf8ba5d8b6ccbc9913b5f738ddf22403f145d79b2a878
-
SHA512
61a3d7505044fdc048a1fa80a2bca9d000b3cd9d45d47efd5365e0cb4b216bec8c4927d30174234cf70ef00d773aa77bd6b6f6458829a787c4fcc026baacc89e
-
SSDEEP
3072:xUl5ocb6PgFyEjFbElloztYeb06f3JIF5TxWH4l+7lP7pF2:xUXo34FysbUlozBe0j7lP7pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2268 Unicorn-33404.exe 2000 Unicorn-52921.exe 2632 Unicorn-16719.exe 2596 Unicorn-25615.exe 2356 Unicorn-54950.exe 2512 Unicorn-17447.exe 2344 Unicorn-61852.exe 2380 Unicorn-25266.exe 2084 Unicorn-16544.exe 584 Unicorn-53108.exe 1884 Unicorn-41602.exe 2236 Unicorn-60529.exe 1452 Unicorn-20841.exe 1972 Unicorn-53321.exe 1912 Unicorn-33455.exe 1440 Unicorn-46777.exe 2908 Unicorn-17250.exe 1952 Unicorn-46222.exe 1296 Unicorn-62921.exe 840 Unicorn-19663.exe 1068 Unicorn-32661.exe 2160 Unicorn-10.exe 1640 Unicorn-29751.exe 2972 Unicorn-46834.exe 664 Unicorn-38111.exe 2192 Unicorn-9138.exe 3000 Unicorn-22137.exe 2112 Unicorn-34197.exe 2816 Unicorn-33451.exe 2304 Unicorn-54063.exe 2280 Unicorn-24166.exe 2012 Unicorn-44032.exe 3024 Unicorn-55900.exe 1744 Unicorn-33102.exe 1736 Unicorn-16212.exe 2628 Unicorn-59312.exe 2488 Unicorn-61580.exe 1156 Unicorn-37630.exe 2400 Unicorn-61388.exe 1200 Unicorn-17232.exe 2320 Unicorn-43634.exe 1656 Unicorn-59416.exe 2000 Unicorn-27106.exe 2632 Unicorn-46972.exe 772 Unicorn-43250.exe 2216 Unicorn-50864.exe 2164 Unicorn-59032.exe 2044 Unicorn-46266.exe 2656 Unicorn-51715.exe 1576 Unicorn-51715.exe 2672 Unicorn-51139.exe 2124 Unicorn-55223.exe 2612 Unicorn-24257.exe 476 Unicorn-44123.exe 1880 Unicorn-55861.exe 2708 Unicorn-29000.exe 2812 Unicorn-3749.exe 2120 Unicorn-59665.exe 2912 Unicorn-41321.exe 2496 Unicorn-24793.exe 1764 Unicorn-49188.exe 2544 Unicorn-12239.exe 2428 Unicorn-13199.exe 1212 Unicorn-33236.exe -
Loads dropped DLL 64 IoCs
pid Process 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 2268 Unicorn-33404.exe 2268 Unicorn-33404.exe 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 2000 Unicorn-52921.exe 2000 Unicorn-52921.exe 2268 Unicorn-33404.exe 2268 Unicorn-33404.exe 2632 Unicorn-16719.exe 2632 Unicorn-16719.exe 2596 Unicorn-25615.exe 2000 Unicorn-52921.exe 2596 Unicorn-25615.exe 2000 Unicorn-52921.exe 2356 Unicorn-54950.exe 2356 Unicorn-54950.exe 2512 Unicorn-17447.exe 2512 Unicorn-17447.exe 2632 Unicorn-16719.exe 2632 Unicorn-16719.exe 2380 Unicorn-25266.exe 2380 Unicorn-25266.exe 584 Unicorn-53108.exe 584 Unicorn-53108.exe 2512 Unicorn-17447.exe 2344 Unicorn-61852.exe 2344 Unicorn-61852.exe 2512 Unicorn-17447.exe 2596 Unicorn-25615.exe 2596 Unicorn-25615.exe 2084 Unicorn-16544.exe 2084 Unicorn-16544.exe 1884 Unicorn-41602.exe 1884 Unicorn-41602.exe 2356 Unicorn-54950.exe 2356 Unicorn-54950.exe 2236 Unicorn-60529.exe 2236 Unicorn-60529.exe 2380 Unicorn-25266.exe 2380 Unicorn-25266.exe 1912 Unicorn-33455.exe 1912 Unicorn-33455.exe 2908 Unicorn-17250.exe 2908 Unicorn-17250.exe 1884 Unicorn-41602.exe 1884 Unicorn-41602.exe 1440 Unicorn-46777.exe 1440 Unicorn-46777.exe 1972 Unicorn-53321.exe 1972 Unicorn-53321.exe 2344 Unicorn-61852.exe 2344 Unicorn-61852.exe 1952 Unicorn-46222.exe 2084 Unicorn-16544.exe 1452 Unicorn-20841.exe 2084 Unicorn-16544.exe 1952 Unicorn-46222.exe 1452 Unicorn-20841.exe 584 Unicorn-53108.exe 584 Unicorn-53108.exe 1296 Unicorn-62921.exe 1296 Unicorn-62921.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2452 2160 WerFault.exe 49 2936 1776 WerFault.exe 100 1084 308 WerFault.exe 257 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 2268 Unicorn-33404.exe 2000 Unicorn-52921.exe 2632 Unicorn-16719.exe 2596 Unicorn-25615.exe 2356 Unicorn-54950.exe 2512 Unicorn-17447.exe 2380 Unicorn-25266.exe 2344 Unicorn-61852.exe 584 Unicorn-53108.exe 1884 Unicorn-41602.exe 2084 Unicorn-16544.exe 2236 Unicorn-60529.exe 1912 Unicorn-33455.exe 1972 Unicorn-53321.exe 2908 Unicorn-17250.exe 1440 Unicorn-46777.exe 1452 Unicorn-20841.exe 1952 Unicorn-46222.exe 1296 Unicorn-62921.exe 840 Unicorn-19663.exe 1068 Unicorn-32661.exe 2160 Unicorn-10.exe 1640 Unicorn-29751.exe 2972 Unicorn-46834.exe 664 Unicorn-38111.exe 2192 Unicorn-9138.exe 2816 Unicorn-33451.exe 2112 Unicorn-34197.exe 2304 Unicorn-54063.exe 3000 Unicorn-22137.exe 2012 Unicorn-44032.exe 2280 Unicorn-24166.exe 3024 Unicorn-55900.exe 1744 Unicorn-33102.exe 1736 Unicorn-16212.exe 2628 Unicorn-59312.exe 1156 Unicorn-37630.exe 2488 Unicorn-61580.exe 2400 Unicorn-61388.exe 1200 Unicorn-17232.exe 2320 Unicorn-43634.exe 1656 Unicorn-59416.exe 2000 Unicorn-27106.exe 2632 Unicorn-46972.exe 772 Unicorn-43250.exe 2164 Unicorn-59032.exe 2216 Unicorn-50864.exe 2044 Unicorn-46266.exe 2656 Unicorn-51715.exe 1576 Unicorn-51715.exe 2672 Unicorn-51139.exe 2124 Unicorn-55223.exe 2612 Unicorn-24257.exe 476 Unicorn-44123.exe 1880 Unicorn-55861.exe 2708 Unicorn-29000.exe 2812 Unicorn-3749.exe 2120 Unicorn-59665.exe 2912 Unicorn-41321.exe 2496 Unicorn-24793.exe 1764 Unicorn-49188.exe 2544 Unicorn-12239.exe 2428 Unicorn-13199.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2268 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2268 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2268 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2268 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 28 PID 2268 wrote to memory of 2000 2268 Unicorn-33404.exe 29 PID 2268 wrote to memory of 2000 2268 Unicorn-33404.exe 29 PID 2268 wrote to memory of 2000 2268 Unicorn-33404.exe 29 PID 2268 wrote to memory of 2000 2268 Unicorn-33404.exe 29 PID 2248 wrote to memory of 2632 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2632 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2632 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2632 2248 f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2596 2000 Unicorn-52921.exe 31 PID 2000 wrote to memory of 2596 2000 Unicorn-52921.exe 31 PID 2000 wrote to memory of 2596 2000 Unicorn-52921.exe 31 PID 2000 wrote to memory of 2596 2000 Unicorn-52921.exe 31 PID 2268 wrote to memory of 2356 2268 Unicorn-33404.exe 32 PID 2268 wrote to memory of 2356 2268 Unicorn-33404.exe 32 PID 2268 wrote to memory of 2356 2268 Unicorn-33404.exe 32 PID 2268 wrote to memory of 2356 2268 Unicorn-33404.exe 32 PID 2632 wrote to memory of 2512 2632 Unicorn-16719.exe 33 PID 2632 wrote to memory of 2512 2632 Unicorn-16719.exe 33 PID 2632 wrote to memory of 2512 2632 Unicorn-16719.exe 33 PID 2632 wrote to memory of 2512 2632 Unicorn-16719.exe 33 PID 2596 wrote to memory of 2344 2596 Unicorn-25615.exe 34 PID 2596 wrote to memory of 2344 2596 Unicorn-25615.exe 34 PID 2596 wrote to memory of 2344 2596 Unicorn-25615.exe 34 PID 2596 wrote to memory of 2344 2596 Unicorn-25615.exe 34 PID 2000 wrote to memory of 2380 2000 Unicorn-52921.exe 35 PID 2000 wrote to memory of 2380 2000 Unicorn-52921.exe 35 PID 2000 wrote to memory of 2380 2000 Unicorn-52921.exe 35 PID 2000 wrote to memory of 2380 2000 Unicorn-52921.exe 35 PID 2356 wrote to memory of 2084 2356 Unicorn-54950.exe 36 PID 2356 wrote to memory of 2084 2356 Unicorn-54950.exe 36 PID 2356 wrote to memory of 2084 2356 Unicorn-54950.exe 36 PID 2356 wrote to memory of 2084 2356 Unicorn-54950.exe 36 PID 2512 wrote to memory of 584 2512 Unicorn-17447.exe 37 PID 2512 wrote to memory of 584 2512 Unicorn-17447.exe 37 PID 2512 wrote to memory of 584 2512 Unicorn-17447.exe 37 PID 2512 wrote to memory of 584 2512 Unicorn-17447.exe 37 PID 2632 wrote to memory of 1884 2632 Unicorn-16719.exe 38 PID 2632 wrote to memory of 1884 2632 Unicorn-16719.exe 38 PID 2632 wrote to memory of 1884 2632 Unicorn-16719.exe 38 PID 2632 wrote to memory of 1884 2632 Unicorn-16719.exe 38 PID 2380 wrote to memory of 2236 2380 Unicorn-25266.exe 39 PID 2380 wrote to memory of 2236 2380 Unicorn-25266.exe 39 PID 2380 wrote to memory of 2236 2380 Unicorn-25266.exe 39 PID 2380 wrote to memory of 2236 2380 Unicorn-25266.exe 39 PID 584 wrote to memory of 1452 584 Unicorn-53108.exe 40 PID 584 wrote to memory of 1452 584 Unicorn-53108.exe 40 PID 584 wrote to memory of 1452 584 Unicorn-53108.exe 40 PID 584 wrote to memory of 1452 584 Unicorn-53108.exe 40 PID 2344 wrote to memory of 1972 2344 Unicorn-61852.exe 42 PID 2344 wrote to memory of 1972 2344 Unicorn-61852.exe 42 PID 2344 wrote to memory of 1972 2344 Unicorn-61852.exe 42 PID 2344 wrote to memory of 1972 2344 Unicorn-61852.exe 42 PID 2512 wrote to memory of 1912 2512 Unicorn-17447.exe 41 PID 2512 wrote to memory of 1912 2512 Unicorn-17447.exe 41 PID 2512 wrote to memory of 1912 2512 Unicorn-17447.exe 41 PID 2512 wrote to memory of 1912 2512 Unicorn-17447.exe 41 PID 2596 wrote to memory of 1440 2596 Unicorn-25615.exe 43 PID 2596 wrote to memory of 1440 2596 Unicorn-25615.exe 43 PID 2596 wrote to memory of 1440 2596 Unicorn-25615.exe 43 PID 2596 wrote to memory of 1440 2596 Unicorn-25615.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1167f1220c3db301e4eca1a16fe4452_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33404.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52921.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25615.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61852.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53321.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9138.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59416.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62784.exe9⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22541.exe10⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3023.exe11⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7621.exe12⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exe13⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57658.exe14⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19789.exe15⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16525.exe16⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60012.exe17⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19992.exe18⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exe19⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29494.exe20⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2353.exe21⤵PID:2464
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20620.exe11⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40180.exe12⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exe13⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exe14⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exe15⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27542.exe16⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe17⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36027.exe18⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45669.exe19⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe20⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14605.exe21⤵PID:2404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14511.exe18⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exe19⤵PID:2188
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27106.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exe8⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65000.exe9⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33610.exe10⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24150.exe11⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exe12⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2489.exe13⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36701.exe14⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3058.exe15⤵PID:308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 308 -s 20016⤵
- Program crash
PID:1084
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22137.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59032.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50532.exe8⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5706.exe9⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1565.exe10⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12032.exe11⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45956.exe12⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43219.exe13⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38777.exe14⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55212.exe15⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38077.exe16⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64797.exe17⤵PID:1676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46777.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50864.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12239.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50008.exe9⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31955.exe10⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10193.exe11⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13753.exe12⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16655.exe13⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exe14⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37200.exe15⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6053.exe16⤵PID:2104
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46266.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24793.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55981.exe8⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15000.exe9⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exe10⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-548.exe11⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55966.exe12⤵PID:1464
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25266.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60529.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19663.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55900.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59665.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42961.exe9⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40548.exe10⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe11⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48566.exe12⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21647.exe13⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63857.exe14⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40303.exe15⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54221.exe16⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe17⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28202.exe18⤵PID:2488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33102.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17959.exe9⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44248.exe10⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exe11⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54072.exe12⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29070.exe13⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60354.exe14⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40728.exe15⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exe16⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36219.exe17⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31419.exe18⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26775.exe19⤵PID:1656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32661.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16212.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3749.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59297.exe8⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11746.exe9⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29677.exe10⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exe11⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exe12⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53603.exe13⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8621.exe14⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4252.exe15⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50127.exe16⤵PID:1200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46222.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33451.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46972.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6676.exe8⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27253.exe9⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exe10⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43823.exe11⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19179.exe12⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31325.exe13⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12954.exe14⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14480.exe15⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15170.exe16⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exe17⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23433.exe18⤵PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43250.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58892.exe7⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17528.exe8⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62058.exe9⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe10⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31104.exe11⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39791.exe12⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60551.exe13⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exe14⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exe15⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55202.exe16⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exe17⤵PID:640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34197.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51139.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exe7⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 2408⤵
- Program crash
PID:2936
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62921.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44032.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13090.exe7⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31477.exe8⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50413.exe9⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3890.exe10⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48421.exe11⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62035.exe12⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11563.exe13⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9903.exe14⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5295.exe15⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54870.exe16⤵PID:1240
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16847.exe7⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3983.exe8⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33138.exe9⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28001.exe10⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19789.exe11⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53904.exe12⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exe13⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47319.exe14⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38928.exe15⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exe16⤵PID:2168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16719.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17447.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53108.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20841.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54063.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17232.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exe8⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65467.exe9⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42821.exe10⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53890.exe11⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61259.exe12⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55992.exe13⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exe14⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44620.exe15⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27698.exe16⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38959.exe17⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53697.exe18⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39961.exe19⤵PID:2052
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55052.exe9⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56599.exe10⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13807.exe11⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46065.exe12⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43634.exe13⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18606.exe14⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53686.exe15⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55020.exe16⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42244.exe17⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63998.exe18⤵PID:2732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43634.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49188.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6479.exe8⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21493.exe9⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46480.exe10⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exe11⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22306.exe12⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29950.exe13⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exe14⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20781.exe15⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35503.exe16⤵PID:2580
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29000.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2421.exe7⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exe8⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53423.exe9⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18883.exe10⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56350.exe11⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53099.exe12⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60619.exe13⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26048.exe14⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61190.exe15⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25576.exe16⤵PID:1912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61745.exe14⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56821.exe15⤵PID:2328
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 2406⤵
- Program crash
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59312.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41321.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31477.exe7⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34378.exe8⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16558.exe9⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42313.exe10⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29070.exe11⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21727.exe12⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3452.exe13⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27542.exe14⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25927.exe15⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55020.exe16⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8637.exe17⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56821.exe18⤵PID:1908
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6905.exe11⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51086.exe12⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21206.exe13⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63764.exe14⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe15⤵PID:2344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41602.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17250.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29751.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61580.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55223.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49847.exe8⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20351.exe9⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47014.exe10⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32645.exe11⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24254.exe12⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10193.exe13⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3587.exe14⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21258.exe15⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64916.exe16⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35503.exe17⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exe18⤵PID:3028
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18788.exe9⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21218.exe10⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8441.exe11⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exe12⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22306.exe13⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41434.exe14⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9005.exe15⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49177.exe16⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1486.exe17⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46510.exe18⤵PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65030.exe16⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exe17⤵PID:2252
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24257.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47730.exe7⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exe8⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54440.exe9⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4824.exe10⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58016.exe11⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60053.exe12⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22114.exe13⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18549.exe14⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10671.exe15⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64631.exe16⤵PID:2164
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37630.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33236.exe6⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24928.exe7⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60958.exe8⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13615.exe9⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39407.exe10⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23240.exe11⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44252.exe12⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21357.exe13⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe14⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22774.exe15⤵PID:1768
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5618.exe8⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32168.exe9⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54163.exe10⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7858.exe11⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51595.exe12⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11730.exe13⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11865.exe14⤵PID:1088
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46834.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61388.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44123.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37979.exe7⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16184.exe8⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34378.exe9⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44155.exe10⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21675.exe11⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6856.exe12⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47552.exe13⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32637.exe14⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36219.exe15⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54688.exe16⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13562.exe17⤵PID:1948
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22955.exe8⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57066.exe9⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57357.exe10⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32233.exe11⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46011.exe12⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32083.exe13⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8611.exe14⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14091.exe15⤵PID:2896
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55861.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22541.exe6⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34845.exe7⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64108.exe8⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13615.exe9⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25811.exe10⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41444.exe11⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36992.exe12⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22265.exe13⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18399.exe14⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exe15⤵PID:2892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD534ac4dce634b677a2f513cbecd0529a0
SHA1fef2c2f0d951f03dfb541d35b0685c19e34db1b8
SHA2569d15cdc9beb80b3c186a47d01d81377ea3a46e02bd9bb19c1ae248bedf77b320
SHA512c0536fbf081f5282fc81d574bb1d5f696bc9a9497d6712595dacdeb1be0812d8d8256c664b0ad82b9b0009e57127c81dc6d0569c42949ad164c04101ee0faa5f
-
Filesize
184KB
MD5086beadb2c80ad0b03482323937862b3
SHA1808dd1a1bd44e15ba962b85d7328e8712d27718b
SHA2561176e8c20f0fbcfcb2d70e714a224b25192ca3c2330f81a64fe83651da65b2d4
SHA51225fc7f05893a351757bbb82e3a477fa07c7c5ef3905b79f6a1e4f874034a6abd78f41544aca0192ee75a96236b186e5ca845af24e479beed03aaffdef5eb61fd
-
Filesize
184KB
MD5ec417b33822360ed39f1c198d0d6819e
SHA1ec027b9304c562b2a16d8c086ee590686d2ec153
SHA256cf4488911263a78772b5cfa0802460523dcf5854b25463ac5bb43fdbcfd32034
SHA512eb7d0549fc8c366343f98ed3a8dc071c3ddb88fc2933b13768eb78fc37747af1aba9a597c4f029515e6b957aa00b6db2e7e01d7a8476d19060eea0e1e32d99d2
-
Filesize
184KB
MD550c2e801aa313e747b39f26704da133c
SHA148e49c2bfd5c586132739534eab768201a32b8cf
SHA256f031e0644a985a841ac05b61d2282d3874ee10707107f14f537d91aaea189eb3
SHA5120502221b8244820812b1ae55e96f0006e7c7da7e84102be8d92ede5adb0f7d2b264dae99c429e6af068eda8218dbb0dea3a04144cf2a439288de7fb0e940d889
-
Filesize
184KB
MD5d4e9292f315ad517eb195e2a9c3e6f73
SHA13c37e0d25a3eb38c27ae0214fc1fe95765380f7d
SHA2565a8fcb03edc0baed24aacfab70f14ef74f6695a726d908c09cce3c286650391c
SHA51246ce0817650d472ddf983d0a01910f469a50f9ac4f8e4d29fe10f5ca3c0c579f2b2fd4276581c2cad04db9b902c37f3ce69463a804f367db25cd4110fc7c7234
-
Filesize
184KB
MD5f077f5e4c2d6de56ba9e2bb3aca79478
SHA122e1965ff688051e8f7e53cb16199e19156dfe7f
SHA2563ee7e4742ce61937f23147db79227c8774219e2047d7f6a222a878f989a0cece
SHA512a94e895fb3d353c161ee6f41245866d222a1c522b057e93ae5050b3ee0ba3b5c5143905283b4100343080d607032351ceb4ef202709999cf612b46307b160858
-
Filesize
184KB
MD5a89ea7d22b81bceb90346020f9813a83
SHA1f5a9909d7b07c3847560ec590b76f51b56db5d25
SHA25623fca1de4afc6af8c44656ab7db8b703c95f79c64a22921466f8c86e5c0b0501
SHA512170bf50e67280a68d2e5e2901e8872d7c90707539c9e0cb1ed4e73ca52405e17a6f3c0d8c1aec433f7a065004adb7140f247be490c9c8b44809fd63be2487866
-
Filesize
184KB
MD59edc98a8c2db2696addd4720a42b71ab
SHA132b5507310256224875cc2b8d0567142efb8fc6e
SHA2569869892ce5b47a899d10d58d46ee3e92159207c6be167e99310eb590a114106d
SHA512e74bdf7bba065c4e5039901bdeba4e65115588fa1169a87d01da09f38eb1f6264e863ce375b774e6a29042f8ed1bf443bd2269992be764bdae53387773d2047d
-
Filesize
184KB
MD5870f839900c6ae6abcdf1e4fe027009d
SHA121be9b7d4171bbc1eb73968d5bc350fc236e609e
SHA256cca339c6776f0a0267938cfd66b4c0c60a0429c250affc2cf164a78b3a818811
SHA51246d4e10b9688d31e4b0c803649527fe32076cc98fe244975710678089842cc10c3592b5f057c2ad5005f7fa83e1f524e4373cbf2a2e41170f44060dbab78730d
-
Filesize
184KB
MD579215e706ec9b5bcd3bb7ce2b484382a
SHA1557397de90fee7d90013bebcbfe7e0b87a5d7e50
SHA2565e25b44bc9006e52330c4fabe707a4c7977fb15068c8414c04617f2f0eda571d
SHA512bf7b8e94e1dbafe8b68dc74550a8e08bf0fcca262383e59f076869c54bd7f9f24e7d708afc53e18d0500e991b4a72235977113d3e6b9be3df3d083242786b5fe
-
Filesize
184KB
MD59127ee5372c36b6250a769a07367862b
SHA193b38007107721cc9c152a1a300218aa5db32923
SHA256271f4be0d9f9e8bbe454ccb37179472fd14cd029a0f3338fa9c7bd82b8f71857
SHA512993548d8645a491742d0c1e07d8a6a39b4e9c2fb6d5d89b9fe075e2946694dadc3b65b370023defb7c3fd87ef87d87fbffd2c85abb56674345f0d16ecacc8899
-
Filesize
184KB
MD5610e6ec5a066a32fa967f6af682045d7
SHA1bf86522bee83f6d1da1542742c963d24535a9c68
SHA25640ebe635902208c83ffde08c10c07accbcdd247d0ff2df319bf80844a76077f4
SHA5124d03d97d8da8fb9cbace59d5305c23d66b3c94b24b6d89f31a75be644b5f81f6fb694f020156e39ee8edcaf53725ae4c2e1f314c879e8ba930ffd005f7329680
-
Filesize
184KB
MD561bd7e205f1f89c418375a9396764ec1
SHA1a75711352a0340c2c68c34133dca1a7b38657122
SHA256657c01991e0c691b24e9f6e60fb10c9def992cf7ba6fec012e4769948f317a9d
SHA512100310add0029de309f140ade5b154dcc070d166d89b398e490b3386c0d5d82fff76ba8e37880e72a05b85b22fbe4a1b98d7e4e39475932d19243fd3a47f2465
-
Filesize
184KB
MD5516d2aa415e7356590ae336eaefe02a5
SHA1f7be16b22dc590dc214b32009cab550d74966f95
SHA256fd26aad489371589aecd4c5618377274444444c8d2f7c6d67983f5c65745a0ee
SHA512f5abd8c00030c1f88700f1c88d91c3f0b06705b7ca0ef3dabb9c10712f6495b5688024ea8b91ad9b299decd0b89046259b31e8991fe14bd5f588e4bcacb349c8
-
Filesize
184KB
MD5b6f6fa83726ad20da9365d36ca11f0d6
SHA16a729feeffce5bc14e8e352e346f467875323817
SHA25608c4d8658d9ded01e38cfca907406d4ed0005eda109e1be46dbd131a3232ecec
SHA5124117a318070d3b42b40fcc1d5deb1787568f3f6898336b51286c7a2e64f62596ddd2f2bdd62d96c5cb71ae3b90bca703fa80fb61525ebae406c49f886aa8309d
-
Filesize
184KB
MD5c80c11d61a1b8329d2ee2ecc3fc0f4ce
SHA18b076861452a9ba551cf459f9eeebeefb375675e
SHA25685f1f06a6978b90b896d0fdf1be60dbf08f7c6fa7cfc94a3a8decf66c5719069
SHA512e8c59f6b8a61092fdbaf5bcf34170da1ec6e71a5efdc3d00a1871dcdb0649300c492d6b4e68dacc5b67a8c6c033b37d8ad14f71c4d2b7586de85f09e89d68ddc
-
Filesize
184KB
MD58126d8128a23885b8e63e85ba377c8f3
SHA14c0eb908886faaf8aea73aae3bcbfd34ae1b0896
SHA256b21ddcd6f39292b93c7f961617ac8e1c915dc4a67402279c325bd3dc35ed402a
SHA51252005b0d2a5c077781096e2ceea85e84488548595b0b5167e864e5257514e191294d311faac0109c5529dcfa29c9ce731c84676ce4592c2f1229f77a749887e9
-
Filesize
184KB
MD578131c20c5ab9b77a405174153850fc5
SHA14272f1cddd3f288df6a84374daf6fc062649af79
SHA25606a1780a113b982d2c34ce7b3123bae7459d6d87dd55a3c63c0a9977d2619249
SHA51233ba15e57af0a6560651c14a9e2fdba9e84f3b20652ad1f3b2249c3c98c24b4e7f624066c18c94fc17b8d465697bee80210c0405b3cb183d9f984e6eee59170d
-
Filesize
184KB
MD529fa9f04c55193ad17c91a689bf81c62
SHA1bdacbcbeb7a3142f769e6b84f775ba8736e71b8e
SHA2562e08c1b3b246594e4764d72f1753efebb4f61ddc64aed50c74e7fefdb8c6840f
SHA51291af8721778faa3d227d31d2c0d57079c11046fdf801383e715a00eb587cb0452d65217c73ebed66f765df8fc5e16ee8ddd5f71214b9938f5da4afe170c88b4c
-
Filesize
184KB
MD5a10dfb93b6749d91780822f362d07ccc
SHA1e14b7829eb1753f4a38d70f630e6c4a9ba62f2dc
SHA25624dfa12d28c6586eff35403002f70ce11a1ae34960eb5afd3e5be17b330bf6e8
SHA51238fa43b8f4845c2b40ef2aee1ee37a1c6939020a9058c781dd17d83186e7075483089964f54a49d1968b2c397ab7eb7c0e3cedf0059f7c4b24c325642521e1e3
-
Filesize
184KB
MD5d63deb5c5095c7b9a3af239fd8e4258e
SHA1bf1db73524e0000a70351eddfc3c58d0f709624c
SHA256e2de8ed441632b593ae7364410b15a17e500713f13b0d4d24d26c83790c5b1d8
SHA5120c993527539b507dea452fb8a83d4ff886994b50f14ed5ba625ed8df3ad53980e385c1d454239318d73ee9913735de5282eaa5e614363ba0daf9f46f277c72b0
-
Filesize
184KB
MD5b2e9e547735ca245a63d6cff460f76da
SHA1b81d6684a545611242b8c3ae9d77381050b82ceb
SHA2565a1c33962b859767d6ca38c8afeb6f7a66f24d79fd78f5bf45a38327e34faa9f
SHA5120c679c15295810fa871ae4bbe5d36fd07a17e3d398e11559bf31f3ae092d0300c07f81ad7f838d5564b3efce586dc39631abc970eb6f116a07a89cdf6db698bc
-
Filesize
184KB
MD5a56d5f33805cc807d6e2407ba38148e0
SHA1f812d79ecc3268f1a850653e228acaf90970c5da
SHA256208860b5eb871438545404b6a7835e65f57454f7f90d6011749ee97639726638
SHA512701b4980d6cdbbc6134397a93981f28298ef8df762ac0f7f9499e30551e12c1168d7273a39034b45b719fd0405f01149e2d1200abd7e16fddb4ada84f1cd2d83
-
Filesize
184KB
MD59b09559060753b45dd087613c2cbdebe
SHA1d41c6ed3c7fb6db1e254b95e3f70fcbd5abddf79
SHA256b8727d855729f2e2c0ffd44416115beb74bce8a29f6cf90aee8cd3989fb76dce
SHA512d986749ef89ba1a692ef9d4fbe3e54e6e5fce16f6cd4cf7d7a823d41bcfcd992109687f596906ddb555b180fe9a1c088a16c6074cf40d93eadf2a22c7ae897bc
-
Filesize
184KB
MD5dc7c81eab970a2a96b2d0bd724143cde
SHA107cb6c091d889cdc1781a4164a2fb776e2a12ccc
SHA256dffe490f70d4e4e636a525d04afd1d977371f1e0f6759c7db7f3f373f27f0e3b
SHA5126ebee03f57586637adee1f1440e04d1b4fcf2d390ffb727f633b8fac11e0674dbef1a0e263bf3079187bb6f8d00fb5c9479b8068f3f89ad10a6e34daa8217c86